Presentation 2014-03-27
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers
Yuka ENOMOTO, Akira KANAOKA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions. Recent Windows (7, 8, 8.1) has a possibility to be impersonated by third party (potentially malicious host) as a printer. Thus, Man-In-The-Middle attack may also caused at default setting of Windows. In this paper, flows of discovery and configuration of network printers are investigated by both of specification and real traffic data, then shows the risk of impersonation and MITH attacks.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Network Printer / Impersonation / Man-In-The-Middle Attack / Windows
Paper # ICSS2013-68
Date of Issue

Conference Information
Committee ICSS
Conference Date 2014/3/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers
Sub Title (in English)
Keyword(1) Network Printer
Keyword(2) Impersonation
Keyword(3) Man-In-The-Middle Attack
Keyword(4) Windows
1st Author's Name Yuka ENOMOTO
1st Author's Affiliation Faculty of Science, Toho University()
2nd Author's Name Akira KANAOKA
2nd Author's Affiliation Faculty of Science, Toho University
Date 2014-03-27
Paper # ICSS2013-68
Volume (vol) vol.113
Number (no) 502
Page pp.pp.-
#Pages 5
Date of Issue